Skip to content

Commit 73ac505

Browse files
authored
Merge pull request #2618 from YongRhee-MSFT/docs-editor/exploit-protection-reference-1738362770
Update exploit-protection-reference.md
2 parents df79ab5 + b9e8e12 commit 73ac505

File tree

1 file changed

+3
-1
lines changed

1 file changed

+3
-1
lines changed

defender-endpoint/exploit-protection-reference.md

Lines changed: 3 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -15,7 +15,7 @@ ms.collection:
1515
- m365-security
1616
- tier3
1717
- mde-asr
18-
ms.date: 11/15/2024
18+
ms.date: 02/03/2025
1919
search.appverid: met150
2020
---
2121

@@ -439,6 +439,8 @@ Hardware-enforced stack protection offers robust protection against ROP exploits
439439

440440
Hardware-enforced stack protection only works on chipsets with support for hardware shadow stacks, Intel's Control-flow Enforcement Technology (CET) or AMD shadow stacks.
441441

442+
If you're running applications based on the .Net Framework, hardware-enforced stack protection is compatible with .Net Framework 7 (opt-in), .Net Framework 9.0, or newer. If you're using an application with an older version (earlier than .Net Framework 7), expect stability issues (crashes or hangs) and/or performance issues (high cpu or memory leaks).
443+
442444
### Configuration options
443445

444446
**Audit only** - You can enable this mitigation in audit mode in order to measure the potential compatibility impact on an application. Audit events can then be viewed either in the event viewer or using Advanced Hunting in [Defender for Endpoint](/defender-xdr/advanced-hunting-overview).

0 commit comments

Comments
 (0)